19 research outputs found

    Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets

    Get PDF
    In this paper, we present an effective tree based subspace clustering technique (TreeCLUSS) for finding clusters in network intrusion data and for detecting known as well as unknown attacks without using any labelled traffic or signatures or training. To establish its effectiveness in finding the appropriate number of clusters, we perform a cluster stability analysis. We also introduce an effective cluster labelling technique (CLUSSLab) to label each cluster based on the stable cluster set obtained from TreeCLUSS. CLUSSLab is a multi-objective technique that employs an ensemble approach for labelling each stable cluster generated by TreeCLUSS to achieve high detection rate. We also introduce an effective unsupervised feature clustering technique to identify the dominating feature set from each cluster. We evaluate the performance of both TreeCLUSS and CLUSSLab using several real world intrusion datasets to identify known as well as unknown attacks and find that results are excellent

    An incremental clustering of gene expression data

    Get PDF
    Abstract-This paper presents an incremental clustering algorithm based on DGC, a density-based algorithm we developed earlier [1]. We experimented with real-life datasets and both methods perform satisfactorily. The methods have been compared with some well-known clustering algorithms and they perform well in terms of z-score cluster validity measure

    A rough set-based effective rule generation method for classification with an application in intrusion detection

    Get PDF
    Abstract: In this paper, we use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, we propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise classification rules for each concept satisfying required classification accuracy. Estimating lower and upper approximations substantially reduces the computational complexity of the algorithm. We use UCI ML Repository data sets to test and validate the approach. We also use our approach on network intrusion data sets captured using our local network from network flows. The results show that our approach produces effective and minimal rules and provides satisfactory accuracy. Keywords: rough set; LEM2; inconsistency; minimal; redundant; PCS; intrusion detection; network flow data. Reference to this paper should be made as follows: Gogoi, P., Bhattacharyya, D.K. and Kalita, J.K. (2013) 'A rough set-based effective rule generation method for classification with an application in intrusion detection', Int

    TUANDROMD (Tezpur University Android Malware Dataset)

    No full text

    A common neighbor based technique to detect protein complexes in PPI networks

    No full text
    Detection of protein complexes by analyzing and understanding PPI networks is an important task and critical to all aspects of cell biology. We present a technique called PROtein COmplex DEtection based on common neighborhood (PROCODE) that considers the inherent organization of protein complexes as well as the regions with heavy interactions in PPI networks to detect protein complexes. Initially, the core of the protein complexes is detected based on the neighborhood of PPI network. Then a merging strategy based on density is used to attach proteins and protein complexes to the core-protein complexes to form biologically meaningful structures. The predicted protein complexes of PROCODE was evaluated and analyzed using four PPI network datasets out of which three were from budding yeast and one from human. Our proposed technique is compared with some of the existing techniques using standard benchmark complexes and PROCODE was found to match very well with actual protein complexes in the benchmark data. The detected complexes were at par with existing biological evidence and knowledge. Keywords: Protein-protein interaction network, Protein complexes, Common neighborhood, Densit

    Analysis of Gene Expression Patterns Using Biclustering

    No full text
    Abstract Mining microarray data to unearth interesting expression profile patterns for discovery of in silico biological knowledge is an emerging area of research in computational biology. A group of functionally related genes may have similar expression patterns under a set of conditions or at some time points. Biclustering is an important data mining tool that has been successfully used to analyze gene expression data for biologically significant cluster discovery. The purpose of this chapter is to introduce interesting patterns that may be observed in expression data and discuss the role of biclustering techniques in detecting interesting functional gene groups with similar expression patterns

    Cobi: pattern based co-regulated biclustering of gene expression data.

    No full text
    Abstract Co-regulation is a common phenomenon in gene expression
    corecore